Crawling configuration explanation

The root element of the configuration is DataSourceConnectionConfig and contains the following sub elements:

DataSourceID – the identification of a data source.

SchemaID – specify the schema for a crawler job.

DataConnectionID – describes which agent crawler should be used.

Crawler – implementation class of a crawler.

Agent – implementation class of an agent.

CompoundHandling – specify if packed data (like a ZIP containing files) should be unpack and files within should be crawled (YES or NO).

Attributes – list all attributes which describe a website.

Attribute:

attributes:

Type (required) – the data type (String, Integer or Date).

Name (required) – attributes name.

HashAttribute – specify if the attribute is used for the hash used for delta indexing (true or false). Must be true for at least one attribute which must always have a value.

KeyAttribute – specify if the attribute is used for creating the record ID (true or false). Must be true for at least one attribute. All key attributes must identify the file uniquely, so usually you will set it true for the attribute containing Url FieAttribute.

Attachment – specify if the attribute return the data as attachment of record.

sub elements:

FieldAttribute: Content of element is one of

Url: URL of the web page. NOTE: Must currently be mapped to an attribute named "Url". Mapping to additional attributes are allowed.

Title: The title of the web page from the <title> tag.

Content: The content of the web page. Original binary content, if mapped to an attachment, else it is tried to convert it to a string using the encoding reported in the response headers.

MimeType: Mime type of website as reported in response headers.

MetaAttribute

sub elements MetaName: Key of value to get from metadata.

attribute Type: one of MetaData, ResponseHeader, MetaDataWithResponseHeaderFallBack: read from HTML meta tags, response header or both

attribute ReturnType – structure the metadata will be returned. One of:

MetaDataString – default structure, metadata is returned as single string, for example:

<Valkey="ResponseHeader">Content-type: text/html</Val>

MetaDataValue – only values of metadata are returned, for example:

<Valkey="ResponseHeader">text/html</Val>

MetaDataMObject – metadata is returned as MObject containing attributes with metadata names and values, for example:

Website - contains all important information for accessing and crawling a website.

ProjectName - defines project name

Sitemaps - for supporting Google site maps. sitemap.xml, sitemap.xml.gz and sitemap.gz formats are supported. See [[1]]. Links extracted from <loc> tags are added to the current level links. Crawler looks for the sitemap file at the root directory of the web server and then caches it for the particular host to avoid parsing the sitemap again for the URL already processed.

Header - request headers separated by semicolon. Headers should be in format "<header_name>:<header_content>", separated by semicolon.

UserAgent - element used to identify crawler to the server as a specific user agent origination the request. The UserAgent string generated looks like the following: Name/Version (Description, Url, Email)

Name (required)

Version

Description

URL

Email

Robotstxt element used for supporting robots.txt information. The Robots Exclusion Standard tells crawler how to crawl a website – or rather which resources should not be crawled. See [[4]]

Policy: there are five types of policies offered on how to deal with robots.txt rules:

Classic. Simply obey the robots.txt rules. Recommended unless you have special permission to collect a site more aggressively.

Ignore. Completely ignore robots.txt rules.

Custom. Obey your own, custom, robots.txt instead of those discovered on the relevant site. The attribute Value must contain the path to a locally available robots.txt file in this case.

Set. Limit robots names which rules are followed to the given set. Value attribute must handle robots names separated by semicolon in this case.

Value: specifies the filename with the robots.txt rules for Custom policy and set of agent names for the Set policy.

AgentNames: specifies the list of agents we advertise. This list should be started with the same name as UserAgent Name (for example: crawler user-agent name that is used for the crawl job)

CrawlingModel: there are two models available:

Type: the model type (MaxBreadth or MaxDepth)

MaxBreadth: crawling a web site through a limited number of links.

MaxDepth: crawling a web site with specifying the maximum crawling depth.

Value: parameter (Integer)

CrawlScope: decides for each discovered URI if it is within the scope of the current crawl.

Type: following scope are provided:

Broad: accept all. This scope does not impose any limits on the hosts, domains, or URI paths crawled.

Domain: accept if on same 'domain' as seeds (start URL). This scope limits discovered URIs to the set of domains defined by the provided seeds. That is any URI discovered belonging to a domain from which one of the seed came is within scope. Using the seed 'brox.de', a domain scope will fetch 'bugs.brox.de', 'confluence.brox.de', etc. It will fetch all discovered URIs from 'brox.de' and from any subdomain of 'brox.de'.

Host: accept if on exact host as seeds. This scope limits discovered URIs to the set of hosts defined by the provided seeds. If the seed is 'www.brox.de', then we'll only fetch items discovered on this host. The crawler will not go to 'bugs.brox.de'.

Path: accept if on same host and a shared path-prefix as seeds. This scope goes yet further and limits the discovered URIs to a section of paths on hosts defined by the seeds. Of course any host that has a seed **:pointing at its root (i.e. www.sample.com/index.html) will be included in full where as a host whose only seed is www.sample2.com/path/index.html **:will be limited to URIs under /path/.

Filters: every scope can have additional filters to select URI that will be considered to be within or out of scope ( see the section Filters for details)

CrawlLimits: In addition to limits imposed on the scope of the crawl it is possible to enforce arbitrary limits on the duration and extent of the crawling process with the following setting:

SizeLimits:

MaxBytesDownload: stop after a fixed number of bytes have been downloaded (0 means unlimited).

MaxDocumentDownload: stop after downloading a fixed number of documents (0 means unlimited).

MaxTimeSec: stop after a certain number of seconds have elapsed (0 means unlimited). These are not supposed to be hard limits. Once one of these limits is reached, it will trigger a graceful termination of the crawl job, which means that URIs already being crawled will be completed. As a result the set limit will be exceeded by some amount.

MaxLengthBytes: maximum number of bytes to download per document. Will truncate file once this limit is reached.

TimeoutLimits: Whenever crawler connects to or reads from a remote host, it checks the timeouts and aborts the operation if any is exceeded. This prevents anomalous occurrences such as hanging reads or infinite connects.

Timeout: This limit is the total time need to connect and get the download website, and such represents the total of a ConnectTimeout plus a ReadTimeout.

ConnectTimeout: Connect timeout in seconds. TCP connections that take longer to establish will be aborted.

ReadTimeout: Read (and write) timeout in seconds. Reads that take longer will fail. The default value for read timeout is 900 seconds.

WaitLimis:

Wait: Wait the specified number of seconds between the retrievals. Use of this option is recommended, as it lightens the server load by making the *:requests less frequent. Specifying a large value for this option is useful if the network or the destination host is down, so that crawler can wait *:long enough to reasonably expect the network error to be fixed before the retry.

RandomWait: Some web sites may perform log analysis to identify retrieval programs by looking for statistically significant similarities in the time between requests. This option causes the time between requests to vary between 0 and 2 * wait seconds, where wait was specified using the wait setting, in order to mask crawler's presence from such analysis.

MaxRetries: How often to retry URLs that failed.

WaitRetry: How long to wait between such retries.

Proxy: specifies the HTTP proxy server to be used.

ProxyServer:

Host

Port

Login

Password

Authentication: The Authentication element is used to gain access to areas of websites requiring authentication. Three types of authentication are available: RFC2617 (BASIC and DIGEST types of authentication), HTTP POST or GET of an HTML Form and SSL Certificate based client authentication.

RFC2617:

Host and

Port: equate to the canonical root URI of RFC2617.

Realm: realm as per RFC2617. The realm string must match exactly the realm name presented in the authentication challenge served up by the web server.

Login: username for login.

Password: password to this restricted area.

HMTLFrom:

CredentialDomain: same as the RFC2617 canonical root URI of RFC2617.

HttpMethod: POST or GET

LoginUrl: relative or absolute URI to the page that the HTML Form submits to (Not the page that contains the HTML Form)

FormItems: listing of HTML Form key/value pairs

SSLCertificate:

ProtocolName: name of the protocol to be used, e.g. "https".

Port: port number

TruststoreUrl: location of the file containing one or several trusted certificates.

Minimal configuration example

Html form login example

his example demonstrates how to login to Invision Power Board powered forum. Number of downloaded pages is limited to 15. robots.txt information is ignored. Crawler will advertise itself as Mozilla/5.0.